For The Past 14 Years, Google Stored Some Business Passwords In Plain Text

The integrity of an online account is determined by the strength of its password. If you were to use passwords like “123456”, it wouldn’t even need a hacker to figure it out. Of course, not only do passwords need to be secure but the method of storing them as well. After all, if a company does not secure its password storage, anyone with access will have no problems reading it.


Database Of Instagram Influencers And Celebrities Leaked

Storing contact information in a database makes a lot of sense, but what would make even more sense is if that database was password protected. Unfortunately, that was not the case with a database that contained contact information of millions of Instagram influencers, celebrities, and brand accounts.


US Government Now Warns That Drones Could Be Sending Data Back To China

Recently, the US government seems to be cracking down on Chinese companies who are involved in the communications infrastructure in the US and also their allies. Huawei is one of the more recent casualties where due to the US government’s blacklisting, Google, Intel, and Qualcomm have since suspended their business dealings with them.


AMD Reassures That Their Chips Are Safe From ZombieLoad Vulnerability

While Intel and AMD are seen as rivals in the processor business, it’s safe to say that Intel has largely been seen as having an edge over AMD and tends to be the more preferred brand. However, due to the recent security vulnerabilities that Intel has endured, it could give AMD a slight boost to help them gain more ground over their competitor.


Advertising

Over 20,000 Linksys Routers Leaked Device Connection Histories

Our routers contain a lot more data than we would think or assume, and as such, there might be some information on our routers that some might not feel comfortable with sharing due to privacy concerns. Unfortunately, for some Linksys users, they did not really get a say in the matter.


Patent Reveals Apple’s Radical Plan For In-Display Fingerprint Scanners

When Apple launched the iPhone X and its successors, it felt like Touch ID for the iPhone was pretty much dead, and that facial recognition is the future that Apple will be embracing. However, interestingly enough, not everyone thinks that. In fact, various patent filings in the past show that Apple is still very much exploring new approaches and applications for fingerprint scanners.


Apple Warns Older Macs Could Be Vulnerable To ‘ZombieLoad’ Type Attacks

Recently, it was revealed that there was a newly-discovered vulnerability affecting Intel processors. Dubbed ZombieLoad, the good news is that Intel is said to have since released new microcode to computer makers to help them patch their computers, but it turns out that some computers could still be vulnerable.


Some Of Google’s Titan Security Keys Might Not Be So Secure

Last year, Google launched the Titan security key. For those who are unfamiliar with the gadget, it is a security key that helps authenticate the user to whichever device it is plugged into or connected to. The idea is that by leaving it connected to a device like a computer, in theory, you would never need to have to enter a password again.


Microsoft Warns Of Security Exploit For Older Versions Of Windows

There is a good reason to upgrade to the newest versions of software whenever possible. This is because due to the management of resources, most developers would much rather focus on its newer software than older ones. An example would be Microsoft’s Windows, where in some cases, the company has stopped keeping older versions of Windows updated.


New Intel ‘ZombieLoad’ Security Flaw Discovered

It wasn’t too long ago that Intel was inundated with the Meltdown and Spectre vulnerabilities that affected a ton of their processors. To their credit, the company did take steps to try and address the problem, but it seems that new vulnerabilities have since been discovered by the original researchers who found the Meltdown and Spectre flaws.


WhatsApp Vulnerability Allowed Hackers To Inject Spyware

One of the features of WhatsApp that the company loves to boast about would be its end-to-end encryption. This means that messages sent and received are thoroughly encrypted, thus preventing hackers from intercepting them and reading them. However, it seems that while the app might be protected on that front, there was a vulnerability that was open.


Microsoft’s ElectionGuard Promises More Secure And Transparent Voting

These days with reports of how fake news and hacks have the potential to impact and influence the election in countries around the world, steps to counter and fight that needs to be taken, and this is something that Microsoft is working towards by announcing its open-source ElectionGuard software.


How To Protect Your Google Sheets

The information on your Google Sheets can contain private or sensitive information, and if you’d rather not have anyone simply accessing it, here’s how you can go about securing it.


How To Turn OFF Safe Mode On Android

Just like Windows, Android has a Safe Mode which it enters into whenever something wrong happens. If you’ve encountered this and are wondering how you can get out of Safe Mode, this guide might come in handy.